2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

筛选
英文 中文
On fast exhaustive search of the minimum distance of linear block codes 线性分组码最小距离的快速穷举搜索
J. Broulím, V. Georgiev, N. Boulgouris
{"title":"On fast exhaustive search of the minimum distance of linear block codes","authors":"J. Broulím, V. Georgiev, N. Boulgouris","doi":"10.1109/ICUMT.2016.7765383","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765383","url":null,"abstract":"Code design and assessment can be a computationally intensive task because of billions operations needed for code evaluation. Therefore, it is important that fast algorithms are devised for minimum distance. We propose a scalable variant of a known algorithm for exhaustive search of the minimum distance. The proposed algorithm is based on smart thread management in order to speed up the exhaustive search. The algorithm is particularly efficient when applied in combination with genetic algorithms for code design as a part of code evaluation and can be easily deployed on grid or cloud computing systems.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Piecewise-polynomial curve fitting using group sparsity 基于群稀疏性的分段多项式曲线拟合
Michaela Novosadová, P. Rajmic
{"title":"Piecewise-polynomial curve fitting using group sparsity","authors":"Michaela Novosadová, P. Rajmic","doi":"10.1109/ICUMT.2016.7765379","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765379","url":null,"abstract":"We present a method for segmenting one-dimensional signal, whose segments are modeled as polynomials, and which is corrupted by an additive noise. The method is based on sparse modeling and its formulation as a convex optimization problem is solved by proximal algorithms. We perform experiments on simulated data, discuss the results and suggest future directions that could lead to even better results.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sleep mode performance gains in 5G femtocell clusters 5G飞蜂窝集群的睡眠模式性能提升
C. Bouras, Georgios Diles
{"title":"Sleep mode performance gains in 5G femtocell clusters","authors":"C. Bouras, Georgios Diles","doi":"10.1109/ICUMT.2016.7765347","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765347","url":null,"abstract":"Femtocells present an efficient, low cost solution to help reach the traffic and data rate targets of 5G mobile networks. However, their ad-hoc nature, the expected great density of deployment and their closed registration policy may result in multi-layered networks with base stations' ranges constantly overlapping and non-registered users struggling from the accumulative interference. In this paper, we propose a mechanism where femtocells operate in clusters, and may decide to turn to sleep mode if capacity demand of its users is met adequately by the remaining awake femtocells. We propose a special version of hybrid access targeting only users of neighboring femtocells, in order to reduce the number of active base stations and thus, to reduce interference. We enforce sleep mode under conditions that ensure the increased throughput of each involved registered user and the increased capacity provided by the entire cluster with the extra benefit of reduced energy.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114153493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison of measures of time-frequency distribution optimization 时频分布优化措施的比较
Stanislav Pikula, P. Benes
{"title":"Comparison of measures of time-frequency distribution optimization","authors":"Stanislav Pikula, P. Benes","doi":"10.1109/ICUMT.2016.7765378","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765378","url":null,"abstract":"This article describes the problems of time-frequency representation optimization. The goal is to achieve compromise between good resolution and reduced cross terms. The quantitative measures used for this optimization are described. For the case of a simulated signal a measure based on mean squared error is proposed. The proposed method compares an optimized result to the ideal representation obtained as sum of Wigner-Ville distributions of mono-component signals. Three simulated signals are used to compare optimization of Choi-Williams Distribution, Gabor spectrogram, Short-time Fourier transform and S-method. The optimization is realized on the basis of four quantitative measures: Rényi entropy, Jones-Parks measure, Stanković measure and proposed method. Results show problematic use of Jones-Parks measure for optimization and comparable optimization of all tested time-frequency distributions by means of three usable measures. For practical use with real signal, S-method with Rényi or Stanković measure is recommended.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"127 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved bounds on secrecy capacity in twin-code cloud storage framework 改进了双码云存储框架的保密能力边界
N. Marina, Natasha Paunkoska, Aneta Velkoska
{"title":"Improved bounds on secrecy capacity in twin-code cloud storage framework","authors":"N. Marina, Natasha Paunkoska, Aneta Velkoska","doi":"10.1109/ICUMT.2016.7765384","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765384","url":null,"abstract":"Security and reliability in cloud storage networks are important features for achieving system efficiency. An explicit construction of regenerating codes that perform reliability, availability and security of the stored data, and at the same time perform efficient node repair is already provided. Understanding and achieving the optimal tradeoff among the above listed features is of great importance for improving the functioning in all cloud storage systems. Therefore in this work, we propose a new code construction that includes an outer and an inner code in the process. The outer code, Gabidulin code, as a pre-coding step achieves improved security level in the storage system and the inner one, Twin-code framework, performs efficient distribution, reconstruction and repair process. The proposed code is resilient to an eavesdropper model and gives better results regarding the achievements when are used the minimum bandwidth regenerating (MBR) and minimum storage regenerating (MSR) codes, respectively.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudo-bimodal community detection in Twitter-based networks 基于twitter网络的伪双峰社区检测
Aleksandr Semenov, Igor Zakhlebin, A. Tolmach, S. Nikolenko
{"title":"Pseudo-bimodal community detection in Twitter-based networks","authors":"Aleksandr Semenov, Igor Zakhlebin, A. Tolmach, S. Nikolenko","doi":"10.1109/ICUMT.2016.7765382","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765382","url":null,"abstract":"We present a novel approach to clustering Twitter users and characterizing their preferences (political or otherwise) based on the features of communication networks extracted from their tweets. We make the assumption that central users in the network, the so-called “top”, or “power” users, set the agenda, while other, “regular” users often retweet and/or mention their tweets, and behavior towards “top” users differs from the behaviour of “regular” users towards each other. We show that network clustering on Twitter can be observed more distinctively on unimodal projections of specially created bimodal networks (bipartite graphs), where top users in the networks are artificially separated into a second part according to node centrality measures. We evaluate our approach on Twitter-based datasets of mentions and retweets related to Russian political protests and a benchmark English-language Twitter dataset with distinctly polarized clusters; we compare various centrality measures and show that our algorithm yields high modularity in the resulting community structure.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126199159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Outage analysis of Dynamic Selective Decode-and-Forward in slow fading wireless relay networks 慢衰落无线中继网络中动态选择译码转发的中断分析
A. Mohamad, R. Visoz, A. Berthet
{"title":"Outage analysis of Dynamic Selective Decode-and-Forward in slow fading wireless relay networks","authors":"A. Mohamad, R. Visoz, A. Berthet","doi":"10.1109/ICUMT.2016.7765396","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765396","url":null,"abstract":"In this paper, we consider a slow fading Multiple Access Multiple Relay Channel (MAMRC) defined as follows: (1) Multiple statistically independent sources communicate with a single destination with the help of multiple half-duplex dedicated relays; (2) The links between the different nodes are independent, and subject to slow fading and additive white Gaussian noise; (3) Sources and cooperating relays interfere (non-orthogonal transmission); (4) No Channel State Information (CSI) at senders and perfect CSI at receivers is available and no feedback is allowed. We introduce an advanced Decode-and-Forward (DF) protocol, referred to as Dynamic Selective Decode and Forward (D-SDF), where each relay individually decides the end of its listening phase and the beginning of its cooperation phase based on a predefined selection strategy. We analyse the outage behavior of this protocol under the assumption that each relay sender employs joint network channel coding and each receiver implements joint network channel decoding, and demonstrate that D-SDF outperforms static SDF in a variety of transmission scenarios.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128041261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Developing a movement algorithm for a wheeled robot moving over a rough terrain 开发轮式机器人在崎岖地形上移动的运动算法
V. Mazulina, Y. Litvinov, A. Bushuev
{"title":"Developing a movement algorithm for a wheeled robot moving over a rough terrain","authors":"V. Mazulina, Y. Litvinov, A. Bushuev","doi":"10.1109/ICUMT.2016.7765224","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765224","url":null,"abstract":"This paper presents control algorithm of the wheeled robot moving along a given route on a rough terrain. The robot operates in the autonomous mode. Analysis of the surrounding space is carried out by vision systems, ultrasonic sensor, gyroscope and GPS module. Data which have been taken from sensors, are used by built-in processor for building a path detour obstacles and returning to the originally specified route, as well as for creating the local map of the area.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123880006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Remote monitoring infrastructure for IEC 61499 based control software 基于IEC 61499控制软件的远程监控基础设施
M. Wenger, Alois Zoitl, J. Blech, I. Peake
{"title":"Remote monitoring infrastructure for IEC 61499 based control software","authors":"M. Wenger, Alois Zoitl, J. Blech, I. Peake","doi":"10.1109/ICUMT.2016.7765387","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765387","url":null,"abstract":"In this paper, we present our work on monitoring of control software behavior for PLCs. In particular, we are looking at IEC 61499-based software specifications. Monitoring is done remotely, i.e., the interface behavior of function blocks is streamed to a cloud-based service. Specifications are realized using formal languages such as 1) regular expressions, 2) timed automata, 3) temporal logic. Monitors can be automatically generated from these languages. Using our specifications, we are able to detect abnormal behavior in control software such as timing changes that can, e.g., show the presence of memory leaks or a virus. We demonstrate our ideas using an example.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hybrid parallel neuro-controller for multirotor unmanned aerial vehicle 多旋翼无人机混合并联神经控制器
A. Bobtsov, A. Guirik, M. Budko, M. Budko
{"title":"Hybrid parallel neuro-controller for multirotor unmanned aerial vehicle","authors":"A. Bobtsov, A. Guirik, M. Budko, M. Budko","doi":"10.1109/ICUMT.2016.7765223","DOIUrl":"https://doi.org/10.1109/ICUMT.2016.7765223","url":null,"abstract":"This paper provides a new method of building a flight control system for multirotor unmanned aerial vehicle based on hybrid parallel neuro-controller that uses radial basis function artificial neural network. Activation functions of hidden layer neurons are optimized in a way that allows for online training. We show that proposed hybrid neuro-controller is more effective than traditional manually configured PID controller.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126878902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信